Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
37766471985740459a9104e6675e0387_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37766471985740459a9104e6675e0387_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37766471985740459a9104e6675e0387_JaffaCakes118.exe
-
Size
351KB
-
MD5
37766471985740459a9104e6675e0387
-
SHA1
f7a7afba1ec754e04b9684055cee820b620f1fee
-
SHA256
d7fc1f5b163c6d5b0e083f25e47b1407f56e8498424097bcfb6f4509f4e1a4fa
-
SHA512
851d9b13fea7f4683a2fbcbe2e17a511c30860bf84c620356503abd6cf35b51b66e6f1e1a338170a041986bfc27d2dad44342fac03066a2ca26b442e66f89588
-
SSDEEP
6144:Z3c4cg0RO2MPN3g893hr/NM7194n4BNO5gMutlRCw5ZIcL0I:ZiBTMFQ893hr/eHwuO+ow5ZIC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2424 k4SqwQDVU95qK.exe -
Executes dropped EXE 2 IoCs
pid Process 2932 k4SqwQDVU95qK.exe 2424 k4SqwQDVU95qK.exe -
Loads dropped DLL 5 IoCs
pid Process 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 2932 k4SqwQDVU95qK.exe 2424 k4SqwQDVU95qK.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\z9DfDBfls8 = "C:\\ProgramData\\NQkclZOkYHWCat8C\\k4SqwQDVU95qK.exe" 37766471985740459a9104e6675e0387_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2320 set thread context of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2932 set thread context of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2424 set thread context of 2764 2424 k4SqwQDVU95qK.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ImagingDevices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37766471985740459a9104e6675e0387_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37766471985740459a9104e6675e0387_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4SqwQDVU95qK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4SqwQDVU95qK.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2544 2320 37766471985740459a9104e6675e0387_JaffaCakes118.exe 31 PID 2544 wrote to memory of 2932 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 32 PID 2544 wrote to memory of 2932 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 32 PID 2544 wrote to memory of 2932 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 32 PID 2544 wrote to memory of 2932 2544 37766471985740459a9104e6675e0387_JaffaCakes118.exe 32 PID 2932 wrote to memory of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2932 wrote to memory of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2932 wrote to memory of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2932 wrote to memory of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2932 wrote to memory of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2932 wrote to memory of 2424 2932 k4SqwQDVU95qK.exe 33 PID 2424 wrote to memory of 2764 2424 k4SqwQDVU95qK.exe 34 PID 2424 wrote to memory of 2764 2424 k4SqwQDVU95qK.exe 34 PID 2424 wrote to memory of 2764 2424 k4SqwQDVU95qK.exe 34 PID 2424 wrote to memory of 2764 2424 k4SqwQDVU95qK.exe 34 PID 2424 wrote to memory of 2764 2424 k4SqwQDVU95qK.exe 34 PID 2424 wrote to memory of 2764 2424 k4SqwQDVU95qK.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\37766471985740459a9104e6675e0387_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37766471985740459a9104e6675e0387_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\37766471985740459a9104e6675e0387_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37766471985740459a9104e6675e0387_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\ProgramData\NQkclZOkYHWCat8C\k4SqwQDVU95qK.exe"C:\ProgramData\NQkclZOkYHWCat8C\k4SqwQDVU95qK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\ProgramData\NQkclZOkYHWCat8C\k4SqwQDVU95qK.exe"C:\ProgramData\NQkclZOkYHWCat8C\k4SqwQDVU95qK.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe" /i:24245⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD537766471985740459a9104e6675e0387
SHA1f7a7afba1ec754e04b9684055cee820b620f1fee
SHA256d7fc1f5b163c6d5b0e083f25e47b1407f56e8498424097bcfb6f4509f4e1a4fa
SHA512851d9b13fea7f4683a2fbcbe2e17a511c30860bf84c620356503abd6cf35b51b66e6f1e1a338170a041986bfc27d2dad44342fac03066a2ca26b442e66f89588